1 / 2

Cloud Computing and the Shared Responsibility Model for Security

Customers are responsible for managing their data (including encryption options), classifying their assets, and using IAM tools to apply the appropriate permissions. The customer shared responsibility model also extends to IT controls.

Download Presentation

Cloud Computing and the Shared Responsibility Model for Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Computing and the Shared Responsibility Model for Security Many industries use a variety of cloud computing environments; but security issues are a constant, no matter the technology used. Cloud providers offer applications for security and yet each organization is responsible for the management of access controls and limiting the data stored in the cloud. Four examples of cloud deployment models are public, private, hybrid, and community. Each has its own parameters as far as accessibility, storage size, and proprietorship. The following are steps organizations can take to strengthen the security of their cloud computing deployments. Implement Best Practices for IAM Identity and access management (IAM) is a framework of technologies and policies designed to ensure that the people in an organization have the appropriate access to technology resources. Best IAM practices restrict access based on such criteria as the length of access, time of day, and geolocation.

  2. Bolster Authentication Controls To prevent stolen credentials from being reused, single sign-on should be supplemented with multi-factor authentication. Deploy Endpoint Security When laptops, tablets, smartphones, and other wireless devices are used to access your network, security should be deployed, such as monitoring activities, software, and status. Security is important with cloud computing and access through local servers. Monitoring NetFlow Data Customers share the responsibility with cloud computing services as regards identifying abnormal activities in the flow between cloud servers. Cloud Computing Networks Must be Segmented Just as segmentation standards are followed with on-premises deployments, they are important in cloud computing, as well. For instance, Internet-facing systems should be segmented from internal systems. Contact Us Today to learn more about strengthening the security of your cloud deployments.

More Related